I saw this during testing on the buildbot VM. Is someone here able to make sense of it? [Thu Mar 10 04:53:54 2022] ============================= [Thu Mar 10 04:53:54 2022] [ BUG: Invalid wait context ] [Thu Mar 10 04:53:54 2022] 5.17.0-rc7 #1 Not tainted [Thu Mar 10 04:53:54 2022] ----------------------------- [Thu Mar 10 04:53:54 2022] umount/1363 is trying to lock: [Thu Mar 10 04:53:54 2022] ffff9239c3ac77d8 (&ret_buf->crfid.fid_mutex){+.+.}-{3:3}, at: cifs_kill_sb+0x66/0xc0 [cifs] [Thu Mar 10 04:53:54 2022] other info that might help us debug this: [Thu Mar 10 04:53:54 2022] context-{4:4} [Thu Mar 10 04:53:54 2022] 2 locks held by umount/1363: [Thu Mar 10 04:53:54 2022] #0: ffff9239c3ac20e0 (&type->s_umount_key#55){+.+.}-{3:3}, at: deactivate_super+0x33/0x50 [Thu Mar 10 04:53:54 2022] #1: ffff9239c33bee20 (&cifs_sb->tlink_tree_lock){+.+.}-{2:2}, at: cifs_kill_sb+0x41/0xc0 [cifs] [Thu Mar 10 04:53:54 2022] stack backtrace: [Thu Mar 10 04:53:54 2022] CPU: 5 PID: 1363 Comm: umount Not tainted 5.17.0-rc7 #1 [Thu Mar 10 04:53:54 2022] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011 [Thu Mar 10 04:53:54 2022] Call Trace: [Thu Mar 10 04:53:54 2022] <TASK> [Thu Mar 10 04:53:54 2022] dump_stack_lvl+0x58/0x71 [Thu Mar 10 04:53:54 2022] __lock_acquire+0x6c9/0x18d0 [Thu Mar 10 04:53:54 2022] ? lock_is_held_type+0xec/0x140 [Thu Mar 10 04:53:54 2022] lock_acquire+0x267/0x330 [Thu Mar 10 04:53:54 2022] ? cifs_kill_sb+0x66/0xc0 [cifs] [Thu Mar 10 04:53:54 2022] ? cifs_kill_sb+0x66/0xc0 [cifs] [Thu Mar 10 04:53:54 2022] __mutex_lock+0x80/0x900 [Thu Mar 10 04:53:54 2022] ? cifs_kill_sb+0x66/0xc0 [cifs] [Thu Mar 10 04:53:54 2022] ? cifs_kill_sb+0x66/0xc0 [cifs] [Thu Mar 10 04:53:54 2022] cifs_kill_sb+0x66/0xc0 [cifs] [Thu Mar 10 04:53:54 2022] deactivate_locked_super+0x3a/0x70 [Thu Mar 10 04:53:54 2022] cleanup_mnt+0xb8/0x150 [Thu Mar 10 04:53:54 2022] task_work_run+0x6a/0xa0 [Thu Mar 10 04:53:54 2022] exit_to_user_mode_prepare+0x2a2/0x2b0 [Thu Mar 10 04:53:54 2022] syscall_exit_to_user_mode+0x2c/0x60 [Thu Mar 10 04:53:54 2022] do_syscall_64+0x46/0x80 [Thu Mar 10 04:53:54 2022] entry_SYSCALL_64_after_hwframe+0x44/0xae [Thu Mar 10 04:53:54 2022] RIP: 0033:0x7f6cb771a54b [Thu Mar 10 04:53:54 2022] Code: 29 0c 00 f7 d8 64 89 01 48 83 c8 ff c3 66 90 f3 0f 1e fa 31 f6 e9 05 00 00 00 0f 1f 44 00 00 f3 0f 1e fa b8 a6 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 8b 0d 0d 29 0c 00 f7 d8 64 89 01 48 [Thu Mar 10 04:53:54 2022] RSP: 002b:00007ffd96646e68 EFLAGS: 00000246 ORIG_RAX: 00000000000000a6 [Thu Mar 10 04:53:54 2022] RAX: 0000000000000000 RBX: 000056294dd2f970 RCX: 00007f6cb771a54b [Thu Mar 10 04:53:54 2022] RDX: 0000000000000001 RSI: 0000000000000000 RDI: 000056294dd37780 [Thu Mar 10 04:53:54 2022] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000002 [Thu Mar 10 04:53:54 2022] R10: 000056294dd2f010 R11: 0000000000000246 R12: 000056294dd37780 [Thu Mar 10 04:53:54 2022] R13: 00007f6cb78d11a4 R14: 000056294dd2fb50 R15: 00007ffd966470d8 [Thu Mar 10 04:53:54 2022] </TASK> -- Regards, Shyam